Application of Hidden Markov Model in Credit Card Fraud Detection
|
|
|
- Erick McDonald
- 10 years ago
- Views:
Transcription
1 Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, [email protected] ABSTRACT In modern retail market environment, electronic commerce has rapidly gained a lot of attention and also provides instantaneous transactions. In electronic commerce, credit card has become the most important means of payment due to fast development in information technology around the world. As the usage of credit card increases in the last decade, rate of fraudulent practices is also increasing every year. Existing fraud detection system may not be so much capable to reduce fraud transaction rate. Improvement in fraud detection practices has become essential to maintain existence of payment system. In this paper, we show how Hidden Markov Model (HMM) is used to detect credit card fraud transaction with low false alarm. An HMM based system is initially studied spending profile of the card holder and followed by checking an incoming transaction against spending behavior of the card holder, if it is not accepted by our proposed HMM with sufficient probability, then it would be a fraudulent transaction. Keywords Credit card, Hidden Markov Model, fraud transaction 1. Introduction In day to day life, online transactions are increased to purchase goods and services. According to Nielsen study conducted in , 28% of the world s total population has been using internet [1]. 85% of these people has used internet to make online shopping and the rate of making online purchasing has increased by 40% from 2005 to The most common method of payment for online purchase is credit card. Around 60% of total transaction was completed by using credit card [2]. In developed countries and also in developing countries to some extent, credit card is most acceptable payment mode for online and offline transaction. As usage of credit card increases worldwide, chances of attacker to steal credit card details and then, make fraud transaction are also increasing. There are several ways to steal credit card details such as phishing websites, steal/lost credit cards, counterfeit cards, theft of card details, intercepted cards etc [3]. The total amount of credit card online fraud transaction made in the United States itself was reported to be $1.6 billion in 2005 and estimated to be $1.7 billion in 2006 [4]. Credit card can be used to purchases goods and services using online and offline transaction mode. It can be divided into two types: 1) physical card and 2) virtual card. In the physical card based purchase, card holder has to produce the card at the merchant counter and merchant will sweep the card in the EMV (Europay, MasterCard and Visa) machine. Fraud transaction can be happened in this mode, only after the card has been stolen. It will be difficult to detect fraud in this type of transaction. If the card holder does not realize loss of the card and does not report to police or card issuing company, it can give financial loses to issuing authorities. In the second method of purchasing i.e. online, these transactions generally happen on telephone or internet DOI : /ijdps
2 and to make this kind of transaction, the user will need some important information about a credit card (such as credit card number, validity, CVV number, name of card holder). To make fraud transaction to purchase goods and services, fraudster will need to know all these details of card only then he/she will make transactions. Most of the time, the cardholder may or may not know that when or where any person will be seen or stolen card information. To detect this kind of fraud transaction, we have proposed a Hidden Markov Model which is studying spending profile of the card holder. An HMM is to analyze the spending profile of each card holder and to find out any discrepancy in the spending patterns. Fraud detection can be detected on analyzing of previous transactions data which helps to form spending profile of the card holder. Every card holder having unique pattern contains information about amount of transactions, details of purchased items, merchant information, date of transaction etc. It will be the most effective method to counter fraud transaction through internet. If any deviation will be noticed from available patterns of the card holder, then it will generate an alarm to the system to stop the transaction. Various techniques for the detection of credit card fraud transaction have been proposed in last few years, are briefly explained some of them in section Other credit card fraud detection techniques Credit card fraud detection has received an important attention from researchers in the world. Several techniques have been developed to detect fraud transaction using credit card which are based on neural network, genetic algorithms, data mining, clustering techniques, decision tree, Bayesian networks etc. Ghosh and Reilly [5] have proposed a neural network method to detect credit card fraud transaction. They have built a detection system, which is trained on a large sample of labeled credit card account transactions. These sample contain example fraud cases due to lost cards, stolen cards, application fraud, stolen card details, counterfeit fraud etc. They tested on a data set of all transactions of credit card account over a subsequent period of time. Bayesian networks are also one technique to detect fraud, and have been used to detect fraud in the credit card industry [6]. This techniques yield better results but having large cycle time to detect fraud. However, the time constraint is one main disadvantage of this technique, especially compared with neural networks. Another algorithm that has been suggested by Bentley [7] is based on genetic programming. A Genetic algorithm is used to establish logic rules capable of classifying credit card transactions into suspicious and non-suspicious classes. Basically, this method follows the scoring process in which overdue payment was checking against last three month payment. If it is greater than that of last three month, then it will be considered as suspicious or else it will be non suspicious. The idea of a similarity tree using decision tree logic has been reported in 1997 by Kokkinaki [8]. A decision tree is defined recursively; it contains nodes and edges that are labeled with attribute names and with values of attributes, respectively. All of these satisfy some condition and get an intensity factor which is defined as the ratio of the number of transactions that satisfy applied conditions over the total number of legitimate transaction. The advantages of the method are easy to understand and implement. However, disadvantages of the methods are that a long time period and check each transaction one by one. The next is clustering technique proposed by Bolton and Hand in 2002 [9]. In this technique, clustering of two algorithms have used for behavioral fraud detection. The proposed system was identified those accounts that are behaving differently from others at the particular moment whereas they were behaving the same previously. Those accounts are treating as suspicious ones and fraud analysis is to be done only on these accounts. If break point analysis can 204
3 identify suspicious behavior such as sudden transaction of high amount and high frequency, then card will be identified as fraudulent. The data mining technique has been using from This technique was very time consuming and difficult process to detect fraud transaction. Since there are millions of transactions processed everyday and their data are highly skewed. The transactions are more legitimate than fraudulent. It requires highly efficient technique to scale down all data and also try to identify fraud transaction not legitimate transactions. Black Box technique has proposed by Chan in 1999 [10]. In this data mining technique, they have divided the whole data into subgroups and apply mining technique to generate classifiers. These classifiers treat as black box and applied variety of algorithms to these black boxes to detect fraud transactions. 3. Hidden markov model (HMM) Hidden Markov Model is probably the simplest and easiest models which can be used to model sequential data, i.e. data samples which are dependent from each other. An HMM is a double embedded random process with two different levels, one is hidden and other is open to all. The Hidden Markov Model is a finite set of states, each of which is associated with a probability distribution. Transitions among the states are governed by a set of probabilities called transition probabilities. In a particular state an outcome or observation can be generated, according to the associated probability distribution. It is only the outcome, not the state visible to an external observer and therefore states are hidden to the outside; hence the name Hidden Markov Model [11, 13]. HMM has been successfully applied to many applications such as speech recognition, robotics, bio-informatics, data mining etc [10-12]. In order to define an HMM completely, following elements are needed. The number of states of the model, N. We denote the set of states S = {S 1 ; S 2 ; S3;.. S N }, where i =1; 2;...; N, is a number of state and S i, is an individual state. The state at time instant t is denoted by q t. The number of observation symbols in the alphabet, M. If the observations are continuous then M is infinite. We denote the set of symbols V = {V 1 ; V 2 ;... V M } where V i, is an individual symbol for a finite value of M. A set of state transition probabilities. where q t denotes the current state, Λ = {a ij } a ij = P{q t+1 = S j q t = S i }, 1 i, j N, Transition probabilities should satisfy the normal stochastic constraints, And a ij 0, 1 i, j N N a ij = 1, 1 i N, j=1 The observation symbol probability matrix B, B = {b j (k)} A probability distribution in each of the states, b j (k) = P{a t = V k q t = S j }, 1 j N, 1 k M 205
4 where, V k denotes the k th observation symbol in the alphabet, and a t the current parameter vector. Following stochastic constraints must be satisfied. And b j (k) 0, 1 j N, 1 k M M b j (k) = 1, 1 j N k=1 If the observations are continuous then we will have to use a continuous probability density function, instead of a set of discrete probabilities. In this case we specify the parameters of the probability density function. Usually the probability density is approximated by a weighted sum of M Gaussian distributions N, b j (a t ) = c jm N (µ jm, jm, a t ) where, c jm = weighting coefficients, µ jm = mean vectors, jm = Covariance matrices c jm should satisfy the stochastic constrains, c jm 0, 1 j N, 1 m M And The initial state distribution, П = {П i }, where, M c jm = 1, 1 j N m=1 П i = P{q i = S i }, 1 i N N П i = 1 ` i=1 Therefore we can use the compact notation λ = (Λ, B, П) to denote an HMM with discrete probability distributions, while to denote one with continuous densities. λ = (Λ, c jm, µ jm, jm, П) Hidden Markov Model assumes that current output (observation) is statistically independent of the previous outputs (observations). We can formulate this assumption mathematically, by considering a sequence of observations, O = O 1, O 2, O 3,... O R, Q = q 1, q 2, q 3...q R, where R, is a number of observation in the sequence and Q, is a one particular sequence. Then according to the assumption for an HMM, probability that O is generated from this state sequence is given by R P{O q 1,q 2,q 3,...q R, λ} = П P(O t q t, λ) t=1 206
5 P(O Q,λ) = b q1 (O 1 ).b q2 (O 2 )...b qr (O R ). The probability of the state sequence Q is given as P(Q λ) = п q1.a q1q2.a q2q3 a qr-1qr Thus, the probability of generation of the observation sequence O by the HMM with respect to λ will be written as follows: P(O λ) = P(O Q, λ).p(q λ). All Q Calculation of probability P(O λ) is an intensive computing process. Hence, a forwardbackward algorithm [13] is used to calculate probability P(O λ). h b 1-m m b 1-l l a 1-2 h b 2-h m b 2-m l b 2-l b 1-h a a a 1-1 a 2-3 a 1-3 a 2-3 a 3-2 a h m l b 3-h b 3-m b 3-l Fig. 1: Transition of different states a Application of HMM in credit card fraud detection In this section, we present credit card fraud detection system based on Hidden Markov Model, which does not require fraud signatures and still is able to detect frauds just by bearing in mind a cardholder s spending habit. The important benefit of the HMM-based approach is an extreme decrease in the number of False Positives transactions recognized as malicious by a fraud detection system even though they are really genuine. As we have shown that How HMM is useful for interstate transition in section 3. In this fraud detection system, we consider three different spending profiles of the card holder which is depending upon price range, named high (h), medium (m) and low (l). In this set of symbols, we define V = {l, m, h} and M =3. The price range of proposed symbols has taken as low (0, $100], medium ($100, $500] and high ($500, up to credit card limit]. After finalizing the state and symbol representations, the next step is to determine different components of the HMM, i.e. the probability matrices A, B, and п so that all parameters required for the HMM is known. These three model parameters are determined in a training phase using the forward-backward algorithm [13]. The initial choice of parameters affects the performance of this algorithm and, hence, it is necessary to choose all these parameters carefully. We consider the special case of fully connected HMM in which every state of the model can be reached to every other state just in a single step, as shown in Fig. 1. 1, 2, 3 etc., are names given to the states to denote different purchase types such as bill payment, restaurant, electronics items etc. In the figure 1, it has been shown that probability of transition from one state to another (for example from 1 to 2 and vice versa, represented as a 1-2 and a 2-1, respectively) and also 207
6 probabilities of transition from a particular state (1, 2, or 3) to different spending habits h, m, or l (for example, b 1-h, b 1-m, etc.). The most important thing is to estimate HMM parameters for each card holder. The forwardbackward algorithm starts with initial HMM parameters and converges to the nearest likelihood values. After deciding HMM parameters, we will consider to form an initial sequence of the existing spending behavior of the card holder. Let O 1, O 2, O R be consisting of R symbols to form a sequence. This sequence is recorded from cardholder s transaction till time t. We put this sequence in HMM model to compute the probability of acceptance. Let us assume be this probability is α 1, which can be calculated as α 1 = P (O 1, O 2, O 3,...O R λ), Let O R+1 be new generated sequence at time t+1, when a transaction is going to process. The total number of sequences is R+1. To consider R sequences only, we will drop O 1 sequence and we will have R sequences from O 2 to O R+1. Let the probability of new R sequences be α 2 Hence, we will find α 2 = P (O 2, O 3, O 4,...O R+1 λ), α = α 1 α 2, If α > 0, it means that HMM consider new sequence i.e. O R+1 with low probability and therefore, this transaction will be considered as fraud transaction if and only if percentage change in probability is greater than a predefined threshold value. α/ α 1 threshold value, The threshold value can be calculated empirically. This Fraud detection system if finds that the present transaction is a malicious, then credit card issuing bank will regret the transaction and FDS discard to add O R+1 symbol to available sequence. If it will be a genuine transaction, FDS will add this symbol in the sequence and will consider in future for fraud detection. 5. Results and discussion It is very difficult to do simulation on real time data set which is not providing from any credit card bank on security reasons. In Table 1, it is shown that a random data set of all transactions happened is categorized according to their types of purchase. With the help of this, we calculate probability of each spending profile (h, l and m) of every category (1, 2 and 3). Fraud detection of incoming transaction will be checked on last 10 transactions. Table 1, list of all transactions happened till date No. of Transaction Category Amount No. of Transaction Category Amount 1 st th nd th rd th th th th th th th th th th th th th
7 Amount (in US $) st 2nd 3rd No. of Transactions Fig. 2: Different transactions amount in a category 0.5 high medium low 0.4 Probability Fig. 3: Probabilities of different spending profiles of each category In Fig. 3, it is shown that the amount of purchased items or services in different categories such as 1 st for restaurant, grocery etc., 2 nd for bill payment, balance transfer etc. and 3 rd for ticket reservation, electronic devices etc., with respect to their number of transactions. We have simulated several large data sets; one is shown in Table 1, in our proposed fraud detection system and found out probability mean distribution of false and genuine transactions. In Fig. 4, it is noted that when probability of genuine transaction is going down, correspondingly probability of false transaction going up and vise versa. If the percentage change in probability of false transaction will be more than threshold value, then alarm will be generated for fraudulent transaction and credit card bank will decline the same transaction. 6. Conclusion Categories In this paper, we have discussed that How Hidden Markov Model will be useful to detect fraudulent online transaction through credit card. The proposed Fraud Detection System is also scalable for handling vast volumes of transactions data processing. The HMM based credit card fraud detection system is not having complex process to perform fraud check like the existing system. Proposed Fraud detection system gives genuine and fast result than existing system. The Hidden Markov Model makes the processing of detection very easy and tries to remove the complexity. 209
8 Genuine Transaction False Transaction 0.8 Probability Fig. 4: Fraud Transaction Mean Distribution In this paper, we have shown that HMM initially checks the upcoming transaction is fraudulent or not. It also takes decision to add new upcoming transaction to existing sequence or not which will be dependent on percentage change in probabilities of old and new sequence. It will decide whether this transaction is genuine or fraudulent depending on threshold values. We have categorized different types of items and services such as restaurant, bill payment etc. These different categories have been considered as three different states of the Hidden Markov Model. In each category, we have further divided into three different groups, high, medium and low based on different ranges of transaction amount. These groups were considered as observation symbols. This technique helps to find the spending behavioral habit of cardholders and purchasing of different items. The most important application of this technique is to decide initial value of observation symbols, probability of transition states and initial estimation of the model parameters. In our proposed model, we have found out more than 88% transactions are genuine and very low false alarm which is about 8 % of total number of transactions. The relative studies and our results sure that the correctness and effectiveness of the proposed system is secure to 82 percent over a broad deviation in the input data. 7. References Fraud Trasaction Mean Distribution [1] Internet usage world statistics, ( (2011). [2] Trends in online shopping, a Global Nelson Consumer Report, (2008). [3] European payment cards fraud report, Payments, Cards and Mobiles LLP & Author, (2010). [4] Statistics for General and On-Line Card Fraud, (2007). [5] Ghosh, Sushmito & Reilly, Douglas L., (1994) Credit Card Fraud Detection with a Neural- Network, Proc. of 27 th Hawaii Int l Conf. on System Science: Information systems: Decision Support and Knowledge-Based Systems, Vol.3, pp [6] Maes, Sam, Tuyls Karl, Vanschoenwinkel Bram & Manderick, Bernard, (2002) Credit Card Fraud Detection Using Bayesian and Neural Networks, Proc. of 1 st NAISO Congress on Neuro Fuzzy Technologies. Hawana. [7] Bentley, Peter J., Kim, Jungwon, Jung, Gil-Ho and Choi, Jong-Uk, (2000) Fuzzy Darwinian Detection of Credit Card Fraud, Proc. of 14 th Annual Fall Symposium of the Korean Information Processing Society. [8] Kokkinaki, A. I., (1997) "On Atypical Database Transactions: Identification of Probable Frauds Using Machine Learning for User Profiling", IEEE Knowledge and Data Engineering Exchange 210
9 Workshop, kdex, pp.107. [9] Bolton, Richard J. & Hand, David J., (2002) Statistical Fraud Detection: A Review, Statistical Science, Vol.10, No. 3, pp [10] Chan, Philip K., Fan, Wei, Prodromidis, Andreas L. & Stolfo, Salvatore J., (1999) Distributed Data Mining in Credit Card Fraud Detection, IEEE Intelligent Systems, Vol. 14, No. 6, pp [11] Rabiner, Lawrence R., (1989) A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition, Proc. of IEEE, Vol. 77, No. 2, pp [12] Fonzo, Valeria De, Aluffi-Pentini, Filippo and Parisi, Valerio, (2007) Hidden Markov Models in Bioinformatics, Current Bioinformatics, Vol. 2, pp [13] Srivastava, Abhinav, Kundu, Amlan, Sural, Shamik and Majumdar, Arun K., (2008) Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 1, pp Author Vrunda Bhusari received B. E. degree in computer technology from Kavikulguru Institute of Technology and Science, Nagpur in 2007 and currently perusing M Tech in computer science from Bharati VidyaPeeth, Pune. Her research interests include data mining, network security and database security. 211
Credit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market
www.ijcsi.org 172 A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market Jaba Suman Mishra 1, Soumyashree Panda 2, Ashis Kumar Mishra 3 1 Department Of Computer Science & Engineering,
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Artificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks R.RAJAMANI Assistant Professor, Department of Computer Science, PSG College of Arts & Science, Coimbatore. Email: [email protected]
Probabilistic Credit Card Fraud Detection System in Online Transactions
Probabilistic Credit Card Fraud Detection System in Online Transactions S. O. Falaki 1, B. K. Alese 1, O. S. Adewale 1, J. O. Ayeni 2, G. A. Aderounmu 3 and W. O. Ismaila 4 * 1 Federal University of Technology,
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 1 P.G. Student, Department of CSE, Govt.College of Engineering, Thirunelveli, India.
Fraud Detection in Online Banking Using HMM
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Fraud Detection in Online Banking Using HMM Sunil Mhamane + and L.M.R.J
Survey on Credit Card Fraud Detection Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 11 Nov 2015, Page No. 15010-15015 Survey on Credit Card Fraud Detection Techniques Priya Ravindra Shimpi,
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL Sandeep Pratap Singh 1, Shiv Shankar P. Shukla 1, Nitin Rakesh 1 and Vipin Tyagi 2 1 Department of Computer Science and Engineering, Jaypee
How To Detect Credit Card Fraud
Card Fraud Howard Mizes December 3, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox Design are trademarks of Xerox Corporation in the United States and/or other countries. Outline of
HMM Based Enhanced Security System for ATM Payment [AICTE RPS sanctioned grant project, Affiliated to University of Pune, SKNCOE, Pune]
HMM Based Enhanced Security System for ATM Payment [AICTE RPS sanctioned grant project, Affiliated to University of Pune, SKNCOE, Pune] Vivek V. Jog 1, Sonal S.Dhamak 3 Vikalpa B. Landge 5, Aaradhana A.
A REVIEW OF VARIOUS CREDIT CARD FRAUD DETECTION TECHNIQUES
A REVIEW OF VARIOUS CREDIT CARD FRAUD DETECTION TECHNIQUES Shraddha Ramesh Bhagwat ME Computer Science Yadavrao Tasgaonkar Institute of Engineering & Technology Bhivpuri Road, Karjat Prof. Vaishali Londhe
EXTENDED CENTROID BASED CLUSTERING TECHNIQUE FOR ONLINE SHOPPING FRAUD DETECTION
EXTENDED CENTROID BASED CLUSTERING TECHNIQUE FOR ONLINE SHOPPING FRAUD DETECTION Priya J Rana 1, Jwalant Baria 2 1 ME IT, Department of IT, Parul institute of engineering & Technology, Gujarat, India 2
DNA: An Online Algorithm for Credit Card Fraud Detection for Games Merchants
DNA: An Online Algorithm for Credit Card Fraud Detection for Games Merchants Michael Schaidnagel D-72072 Tübingen, Germany [email protected] Ilia Petrov, Fritz Laux Data Management Lab Reutlingen
Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization
Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization Avanti H. Vaidya 1, S. W. Mohod 2 1, 2 Computer Science and Engineering Department, R.T.M.N.U University, B.D. College of Engineering
Survey on Credit Card Fraud Detection Methods
Survey on Credit Card Fraud Detection Methods Krishna Kumar Tripathi 1, Mahesh A. Pavaskar 2 1 Computer Engg., M.E Computer, TERNA Engg College NERUL, Mumbai University, Mumbai, Maharashtra, India. 2 Computer
A Review On Credit Card Fraud Detection Using BLAST-SSAHA Method
A Review On Credit Card Fraud Detection Using BLAST-SSAHA Method Mr Yogesh M Narekar 1, Mr Sushil Kumar Chavan 2 Department of Information Technology, RGCER, Nagpur, India 1 Department of Information Technology,
Investigating the Effects of Threshold in Credit Card Fraud Detection System
International Journal of Engineering and Technology Volume 2 No. 7, July, 2012 Investigating the Effects of Threshold in Credit Card Fraud Detection System Alese B. K 1., Adewale O. S 1., Aderounmu G.
Techniques for Fraud Detection
Analysis on Credit Card Fraud Detection Methods 1 Renu HCE Sonepat 2 Suman HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern
Analysis of Credit Card Fraud Detection Techniques
Analysis of Credit Card Fraud Detection Techniques Sunil Bhatia 1, Rashmi Bajaj 2, Santosh Hazari 3 1 Vivekanand Education Society s Institute of Technology, Collector s Colony, Chembur, Mumbai 400074,
Data Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
A COMPARATIVE ASSESSMENT OF SUPERVISED DATA MINING TECHNIQUES FOR FRAUD PREVENTION
A COMPARATIVE ASSESSMENT OF SUPERVISED DATA MINING TECHNIQUES FOR FRAUD PREVENTION Sherly K.K Department of Information Technology, Toc H Institute of Science & Technology, Ernakulam, Kerala, India. [email protected]
To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
The Credit Card Fraud Detection Analysis With Neural Network Methods
The Credit Card Fraud Detection Analysis With Neural Network Methods 1 M.Jeevana Sujitha, 2 K. Rajini Kumari, 3 N.Anuragamayi 1,2,3 Dept. of CSE, A.S.R College of Engineering & Tech., Tetali, Tanuku, AP,
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
How To Detect Credit Card Fraud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Hardware Implementation of Probabilistic State Machine for Word Recognition
IJECT Vo l. 4, Is s u e Sp l - 5, Ju l y - Se p t 2013 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Hardware Implementation of Probabilistic State Machine for Word Recognition 1 Soorya Asokan, 2
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model ABSTRACT Mrs. Arpana Bharani* Mrs. Mohini Rao** Consumer credit is one of the necessary processes but lending bears
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Meta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
Electronic Payment Fraud Detection Techniques
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 137-141, 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information
A Fast Fraud Detection Approach using Clustering Based Method
pp. 33-37 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html A Fast Detection Approach using Clustering Based Method Surbhi Agarwal 1, Santosh Upadhyay 2 1 M.tech Student, Mewar University,
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH Ali Ahmadian Ramaki 1, Reza Asgari 2 and Reza Ebrahimi Atani 3 1 Department of Computer Engineering, Guilan University, Rasht, Iran [email protected]
Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit
Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,
Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut.
Machine Learning and Data Analysis overview Jiří Kléma Department of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz psyllabus Lecture Lecturer Content 1. J. Kléma Introduction,
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, JULY 2012, VOLUME: 02, ISSUE: 04 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES V. Dheepa 1 and R. Dhanapal 2 1 Research
Research Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
e Scientific World Journal, Article ID 252797, 10 pages http://dx.doi.org/10.1155/2014/252797 Research Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining K.
Review Paper on Credit Card Fraud Detection
Review Paper on Credit Card Fraud Detection 1 Suman Research Scholar, GJUS&T Hisar HCE Sonepat 2 Nutan Mtech.CSE,HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars
Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector
Contemporary Engineering Sciences, Vol. 7, 2014, no. 11, 515-522 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4431 Data Mining Approach For Subscription-Fraud Detection in Telecommunication
Recognizing The Theft of Identity Using Data Mining
Recognizing The Theft of Identity Using Data Mining Aniruddha Kshirsagar 1, Lalit Dole 2 1,2 CSE Department, GHRCE, Nagpur, Maharashtra, India Abstract Identity fraud is the great matter of concern in
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2012 www.ijcsn.org ISSN 2277-5420.
Credit Card Fraud: The study of its impact and detection techniques 1 Khyati Chaudhary, 2 Bhawna Mallick 1 Dept. of Computer Science, GCET, Page 31 2 Dept. of Computer Science, GCET, Greater Noida Abstract
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Conditional Random Fields: An Introduction
Conditional Random Fields: An Introduction Hanna M. Wallach February 24, 2004 1 Labeling Sequential Data The task of assigning label sequences to a set of observation sequences arises in many fields, including
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Hidden Markov Models in Bioinformatics. By Máthé Zoltán Kőrösi Zoltán 2006
Hidden Markov Models in Bioinformatics By Máthé Zoltán Kőrösi Zoltán 2006 Outline Markov Chain HMM (Hidden Markov Model) Hidden Markov Models in Bioinformatics Gene Finding Gene Finding Model Viterbi algorithm
A Survey on Fraud Detection in Internet Banking using HMM and BLAST-SSAHA Hybridization Ms. Avanti H. Vaidya*, Prof. S. W. Mohod**
RESEARCH ARTICLE OPEN ACCESS A Survey on Fraud Detection in Internet Banking using HMM and BLAST-SSAHA Hybridization Ms. Avanti H. Vaidya*, Prof. S. W. Mohod** *(Department of Computer Science and Engineering,
203.4770: Introduction to Machine Learning Dr. Rita Osadchy
203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:
Machine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS
AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS Falaki S. O. Alese B. K. Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria. Ismaila W. O. Department of
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
Ericsson T18s Voice Dialing Simulator
Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of
Towards better accuracy for Spam predictions
Towards better accuracy for Spam predictions Chengyan Zhao Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 2E4 [email protected] Abstract Spam identification is crucial
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Automatic Bank Fraud Detection Using Support Vector Machines
Automatic Bank Fraud Detection Using Support Vector Machines Djeffal Abdelhamid 1, Soltani Khaoula 1, Ouassaf Atika 2 1 Computer science department, LESIA Laboratory, Biskra University, Algeria 2 Economic
Improving Credit Card Fraud Detection with Calibrated Probabilities
Improving Credit Card Fraud Detection with Calibrated Probabilities Alejandro Correa Bahnsen, Aleksandar Stojanovic, Djamila Aouada and Björn Ottersten Interdisciplinary Centre for Security, Reliability
METHODOLOGICAL CONSIDERATIONS OF DRIVE SYSTEM SIMULATION, WHEN COUPLING FINITE ELEMENT MACHINE MODELS WITH THE CIRCUIT SIMULATOR MODELS OF CONVERTERS.
SEDM 24 June 16th - 18th, CPRI (Italy) METHODOLOGICL CONSIDERTIONS OF DRIVE SYSTEM SIMULTION, WHEN COUPLING FINITE ELEMENT MCHINE MODELS WITH THE CIRCUIT SIMULTOR MODELS OF CONVERTERS. Áron Szûcs BB Electrical
BIG DATA IN HEALTHCARE THE NEXT FRONTIER
BIG DATA IN HEALTHCARE THE NEXT FRONTIER Divyaa Krishna Sonnad 1, Dr. Jharna Majumdar 2 2 Dean R&D, Prof. and Head, 1,2 Dept of CSE (PG), Nitte Meenakshi Institute of Technology Abstract: The world of
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM
Journal of Engineering Science and Technology Vol. 6, No. 3 (2011) 311-322 School of Engineering, Taylor s University DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM FRANCISCA NONYELUM OGWUELEKA
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Unsupervised Outlier Detection in Time Series Data
Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Data Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
Adaptive Network Intrusion Detection System using a Hybrid Approach
Adaptive Network Intrusion Detection System using a Hybrid Approach R Rangadurai Karthick Department of Computer Science and Engineering IIT Madras, India [email protected] Vipul P. Hattiwale Department
FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS
FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS Leslie C.O. Tiong 1, David C.L. Ngo 2, and Yunli Lee 3 1 Sunway University, Malaysia,
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Credit card fraud and detection techniques: a review
Banks and Bank Systems, Volume 4, Issue 2, 2009 Linda Delamaire (UK), Hussein Abdou (UK), John Pointon (UK) Credit card fraud and detection techniques: a review Abstract Fraud is one of the major ethical
American International Journal of Research in Science, Technology, Engineering & Mathematics
American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-349, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
Credit Card Fraud Detection Using Neural Network
Credit Card Fraud Detection Using Neural Network Raghavendra Patidar, Lokesh Sharma Abstract- The payment card industry has grown rapidly the last few years. Companies and institutions move parts of their
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation
Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards
(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.
Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Prevention Is Better Than Cure EMV and PCI
Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,
Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling
Abstract number: 015-0551 Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling Karuna Jain and Kanchan Joshi Shailesh J. Mehta School of Management, Indian Institute
SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
